EZCA enables Azure customers to have a secure and compliant Certificate Authority in Azure that connects to Intune allowing customers to issue device certificates without the need to run an on-premises ADCS Certificate Authority.
Now that organizations are securing their infrastructure by following Zero trust best practices, attackers are moving left in the pipeline and attacking GitHub. Earlier this month, Okta said that its private GitHub repositories were hacked. When the leaders in authentication and Identity Access Management (IAM) are hacked, it’s time to start taking things much more seriously.
With the move to passwordless and App based MFA, It is understandable that your staff might have concerns about installing the Microsoft Authenticator App, In this blog we will walk you through how to deal with this and secure your organization with strong MFA.
With the move to the cloud, the days of manually managing SSL certificates are gone. Now, Most organizations are moving to the ACME protocol. An easy to use protocol that automatically renews your SSL certificates preventing costly outages while freeing your engineers time to focus on other critical tasks.
As with many security tools, the origin of certificate transparency logs can be traced back to a cyberattack. The attack that can be credited with the creation of CT Logs is the 2011 DigiNotar attack. Now, Certificate Transparency logs enable organizations to have full visibility to all certificates issued for their domains.
With the exponential growth of online services, it has become impossible to manually rotate application certificates. Learn how you can automate your AAD Application certificate rotation with the new automatic Azure AD certificate rotation from EZCA.
SSH has become the weakest point in cloud security and hackers have noticed. Over the past few years we have seen an exponential increase of cyber attacks targeted to SSH. Organizations adopting zero-trust architecture must take a hard look at their existing identity management for SSH.
Stop phishing attacks with Microsofts unphishable credentials by using PIV X.509 certificates in Azure with Azure certificate based authentication (CBA) and become a fully passwordless organization.
After 3 weeks in the west coast, the team is back from GartnerIAM, Blackhat, and Defcon and we wanted to share with you what was top of mind with the hundreds of cybersecurity experts we talked to.
Passwordless authentication just got easier with EZSmartCard and Azure certificate-based authentication. EZSmartCard is the easiest and truly passwordless way to get started with SmartCard management and onboarding.